Search Results - (( web estimation using algorithm ) OR ( java implementation path algorithm ))

Refine Results
  1. 1

    Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer by Ahmad Nezer, Nurul Aqilah

    Published 2017
    “…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment by Shaliza Hayati A. Wahab, Nordin Saad, Azali Saudi, Ali Chekima

    Published 2021
    “…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Expectation maximization clustering algorithm for user modeling in web usage mining system by Mustapha, Norwati, Jalali, Manijeh, Jalali, Mehrdad

    Published 2009
    “…Web usage mining algorithms have been widely utilized for modeling user web navigation behavior. …”
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Web Algorithm search engine based network modelling of Malaria Transmission by Eze, Monday Okpoto

    Published 2013
    “…The Hypertext Induced Topical Search (HITS) web search algorithm was adapted to implement a search engine, which uses the bipartite contact network as the input. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9
  10. 10
  11. 11

    Fuzzy Type-1 Triangular Membership Function Approximation Using Fuzzy C-Means by Azam, M.H., Hasan, M.H., Hassan, S., Abdulkadir, S.J.

    Published 2020
    “…Using a set of equations, these values then estimate the parameters of the triangular membership function. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Interaction diagram and response surface plot of pretensioned inverted T-beam with circular web openings by Cheng H.T., Mohammed B.S., Mustapha K.N.

    Published 2023
    “…An algorithm which is written to plot interaction diagram for estimating the cracking load is proposed. …”
    Article
  13. 13

    Interaction diagram and response surface plot of pretensioned inverted T-beam with circular web openings by Cheng, Hock Tian, Bashar, S. Mohammed, Kamal Nasharuddin, Mustapha

    Published 2009
    “…An algorithm which is written to plot interaction diagram for estimating the cracking load is proposed. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    A resource-aware content adaptation approach for e-learning environment / Mohd Faisal Ibrahim by Ibrahim, Mohd Faisal

    Published 2017
    “…Therefore, an active available bandwidth estimation technique was incorporated in the proposed solution. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Applying learning to filter text by Sainin, Mohd Shamrie

    Published 2005
    “…Text filtering has been a successful application especially in e-mail filtering. The use of probabilistic approaches such as naïve Bayes algorithm is the effective algorithms currently known for learning to filter or classify text document.Naïve Bayes algorithm is one of the algorithms in Machine Learning that manipulates probability estimation or reasoning about the observed data.The growing of bulk e-mail or known as spam e-mail becomes a threat to users’ privacy and network load and in the case of e -mail filtering,naïve Bayes classifier can be trained to automatically detect spam messages.Similar to the e-mail, forum application may be misused by the user to send bad messages and in some extent may offence other readers.Forum filtering may be less important compared to e-mail spam filtering; however there is a possibility of using naïve Bayes to learn the messages and automatically detect bad messages.Most of the forum application found in the web is applying keyword based text filtering which scan the words and change the detected words into certain representation.Instead of defining a set of keywords to filter the forum messages, this paper will explains the experiment in applying a learning to filter text especially in the educational and anonymous forum message, where there is no user registration required to submit messages.…”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17
  18. 18
  19. 19

    Integrated applications of building information modeling in project cost management: a systematic review by M. Farouk, Abdelrahman, Rahimi, A. Rahman

    Published 2023
    “…On the contrary, integrated approaches for cost estimation include integration with cost-plus pricing, discrepancy analysis, construction progress curves, estimation standards, algorithms, declarative mappings, life cycle sustainability assessment, ontology, Web-based frameworks and structured query language. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    BRISK local corner keypoints based hand position estimation for hand gesture trajectory tracking method by Thabet, Eman, Khalid, Fatimah, Sulaiman, Putri Suhaiza, Yaakob, Razali

    Published 2017
    “…The proposed method uses corner keypoints of BRISK and minimum eigenvalue techniques extracted from last segmented region of hand to create searching windows and estimate hand region position on current frame image of video sequences. …”
    Get full text
    Get full text
    Get full text
    Article